Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
13/05/2024, 17:55
Behavioral task
behavioral1
Sample
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f.apk
Resource
android-x86-arm-20240506-en
Behavioral task
behavioral2
Sample
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f.apk
Resource
android-x64-20240506-en
Behavioral task
behavioral3
Sample
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f.apk
Resource
android-x64-arm64-20240506-en
General
-
Target
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f.apk
-
Size
760KB
-
MD5
54d58ec4d05f837a101fa08f94bb98db
-
SHA1
77a2853ad6f0402183806899d801b79c0091cf61
-
SHA256
6008975dfd2aaa07fcb307b12d0c8a273aa6f4882749e29bac1f29e26a035c8f
-
SHA512
47b66a05d9b8e9588b5a82eeff367c79a4ff0102388f2c3cf0202cd6ae2ca306b5c12c450877d4c66d60ca9fc1855e5523f16cdcb7de9d65a25e9ccca2b295ab
-
SSDEEP
12288:Lw8MOAsa1a8Lde9/NhRmmw5WmpYshXZPbGwidNpg/FD:LwL0a1a6e9fRmmw5WmD9idNpyN
Malware Config
Signatures
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground cmf0.c3b5bm90zq.patch -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver cmf0.c3b5bm90zq.patch -
Requests enabling of the accessibility settings. 1 IoCs
description ioc Process Intent action android.settings.ACCESSIBILITY_SETTINGS cmf0.c3b5bm90zq.patch -
Tries to add a device administrator. 2 TTPs 1 IoCs
description ioc Process Intent action android.app.action.ADD_DEVICE_ADMIN cmf0.c3b5bm90zq.patch
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71B
MD5eeea3625cb16f10a90c5137df36ecfe8
SHA1aa754cf4fbb85065c5b4895f1169a2d1eeeceb71
SHA25672a7ad99d35b900c2836de2eb0d90a5cb344d3ab06d316a3cc12335713e28c96
SHA512b42152059e139f7b36e3246792d6f553e0879c9da8dc2967a15ef1e1c3af409212456c534727136b08cfb4d22c6dcd4eb97cf5c02c4f9bd8cfeb809a07f6d3f7
-
Filesize
62B
MD5e95d7081e77aee293caaa2c2e66d9326
SHA14cf9d54e21a11332039759458476dfeda009ea9c
SHA2562570ebf3ada69a635b032676c659f35671f83890848e8f26847d00905247b239
SHA51233e4326d1a25d786784c36b4c999289a6f3dc08c1b90261f2dc32310bdfdc66f23a1f51671f8fa8bc76696281fa237a79fb04c0f03498a893793f9459da73e65
-
Filesize
61B
MD573015d0e81dd05d8488036e1d18be369
SHA1c5ba920eef0c14ff411f5288878504096f55cc6f
SHA2567cd5c483f3aaa09e10795dce14221438181466174729ca72172815bef971a7f5
SHA51232c60d851c90eb908132ce9c44e3099d4ae910371bbc7bd73ae42f012417d53e39673909fb095621aa0b4bcf4df1d86a7a2e43a0f6935d2cd62a928ddca9edc3
-
Filesize
63B
MD5a00882e263556ad01e581a3e14ef3cab
SHA15c6b41c1d9d6b171efc3e7a5b4406c3995414fb1
SHA256e2c4c5d8ed3c052899e6269f7c72e85002e836d479543197cd788bf9a6154c9f
SHA5123a5c25d933f433034660f56bbd7112c68ba046c76e0c84518dce065457c26c0fcf57c7f25b3169e9589c114981f0f7fa52503634913c0c2f7e6719de8418d1fb
-
Filesize
139B
MD5d811e0171709ff538027dff245e75615
SHA1da7648a8d4129655830009c5b815295dcb8cbe5f
SHA256de060332f7643383313fb2afd96e03e13915c8ccd327f2d23299f1e897340bb6
SHA5120d3fc406455b60396f9879693529e799761f8f872e764aa238287a80dff0c648f92e5bdb133c6390873a10d00644b56419c490ef3b1fccaaead91c1002f10827